phpMyAdmin 4.0.x < 4.0.10.1 / 4.1.x < 4.1.14.2 / 4.2.x < 4.2.6 Multiple Vulnerabilities (PMASA-2014-4 - PMASA-2014-7)

medium Nessus Plugin ID 76915

Synopsis

The remote web server hosts a PHP application that is affected by multiple vulnerabilities.

Description

According to its self-reported version number, the phpMyAdmin install hosted on the remote web server is 4.0.x prior to 4.0.10.1, 4.1.x prior to 4.1.14.2, or 4.2.x prior to 4.2.6. It is, therefore, affected by the following vulnerabilities :

- The 'TABLE_COMMENT' parameter input is not being validated in the script 'libraries/structure.lib.php' and could allow cross-site scripting attacks. Note that this issue affects the 4.2.x branch. (CVE-2014-4954)

- The 'trigger' parameter input is not being validated in the script 'libraries/rte/rte_list.lib.php' and could allow cross-site scripting attacks. (CVE-2014-4955)

- The 'table' and 'curr_column_name' parameter inputs are not being validated in the scripts 'js/functions.js' and 'js/tbl_structure.js' respectively and could allow cross-site scripting attacks. (CVE-2014-4986)

- The script 'server_user_groups.php' contains an error that could allow a remote attacker to obtain the MySQL user list and possibly make changes to the application display. Note this issue only affects the 4.1.x and 4.2.x branches. (CVE-2014-4987)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Either upgrade to phpMyAdmin 4.0.10.1 / 4.1.14.2 / 4.2.6 or later, or apply the patches from the referenced links.

See Also

http://www.nessus.org/u?4b66a58c

http://www.phpmyadmin.net/home_page/security/PMASA-2014-4.php

http://www.phpmyadmin.net/home_page/security/PMASA-2014-5.php

http://www.phpmyadmin.net/home_page/security/PMASA-2014-6.php

http://www.phpmyadmin.net/home_page/security/PMASA-2014-7.php

http://www.nessus.org/u?91815216

http://www.nessus.org/u?8cdbf2d1

http://www.nessus.org/u?1aafba98

http://www.nessus.org/u?67967469

http://www.nessus.org/u?c3bfc267

http://www.nessus.org/u?97997036

http://www.nessus.org/u?79fdaa0b

http://www.nessus.org/u?7abe0a00

http://www.nessus.org/u?55cf9587

Plugin Details

Severity: Medium

ID: 76915

File Name: phpmyadmin_pmasa_2014_7.nasl

Version: 1.10

Type: remote

Family: CGI abuses

Published: 7/30/2014

Updated: 11/22/2024

Configuration: Enable paranoid mode, Enable thorough checks

Supported Sensors: Nessus

Enable CGI Scanning: true

Risk Information

VPR

Risk Factor: Low

Score: 3.4

CVSS v2

Risk Factor: Medium

Base Score: 4

Temporal Score: 3

Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:N/A:N

CVSS Score Source: CVE-2014-4987

Vulnerability Information

CPE: cpe:/a:phpmyadmin:phpmyadmin

Required KB Items: www/PHP, www/phpMyAdmin, Settings/ParanoidReport

Exploit Ease: No exploit is required

Patch Publication Date: 7/17/2014

Vulnerability Publication Date: 7/17/2014

Reference Information

CVE: CVE-2014-4954, CVE-2014-4955, CVE-2014-4986, CVE-2014-4987

BID: 68798, 68799, 68803, 68804

CWE: 20, 442, 629, 711, 712, 722, 725, 74, 750, 751, 79, 800, 801, 809, 811, 864, 900, 928, 931, 990